Personnaliser

OK

Embedded Java Security - Debbabi, Mourad

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Filtrer par :

70,91 €

Produit Neuf

  • Ou 17,73 € /mois

    • Livraison à 0,01 €
    • Livré entre le 27 mai et le 5 juin
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781846285905_dbm

    Nos autres offres

    • 106,34 €

      Produit Neuf

      Ou 26,59 € /mois

      • Livraison : 25,00 €
      • Livré entre le 10 et le 15 juin
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes

      Apres acceptation de la commande, le delai moyen d'expedition depuis le Japon est de 48 heures. Le delai moyen de livraison est de 3 a 4 semaines. En cas de circonstances exceptionnelles, les delais peuvent s'etendre jusqu'à 2 mois.

      Voir le détail de l'annonce 
    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Embedded Java Security de Debbabi, Mourad Format Relié  - Livre Encyclopédies, Dictionnaires

        Note : 0 0 avis sur Embedded Java Security de Debbabi, Mourad Format Relié  - Livre Encyclopédies, Dictionnaires

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Embedded Java Security de Debbabi, Mourad Format Relié

         - Livre Encyclopédies, Dictionnaires

        Livre Encyclopédies, Dictionnaires - Debbabi, Mourad - 01/12/2006 - Relié - Langue : Anglais

        . .

      • Auteur(s) : Debbabi, Mourad - Zhioua, Sami - Talhi, Chamseddine - Saleh, Mohamed
      • Editeur : Springer-Verlag London Ltd.
      • Langue : Anglais
      • Parution : 01/12/2006
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 260
      • Expédition : 606
      • Dimensions : 24.1 x 16.0 x 2.1
      • ISBN : 1846285909



      • Résumé :
        Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening. This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and ?as a larger view- mobile devices security.

        Biographie:
        ?Suryadipta Majumdar is currently an Assistant Professor in the Information Security and Digital Forensics department at University at Albany - SUNY. Suryadipta received his Ph.D. on cloud security auditing from Concordia University, Canada. His research mainly focuses on cloud security, Software Defined Network (SDN) security and Internet of Things (IoT) security.

        Taous Madi is currently an Experienced Researcher at Ericsson Canada. She holds a Ph.D. in Information Systems Engineering from Concordia University, Montreal. Previously, she finished her M.Sc. in mobile computing from the University of Science and Technology Houari Boumedien (USTHB), Algiers. Her research interests include cloud computing, network function virtualization security, software-defined networking security, internet of things security, machine learning and formal methods.
        Yushun Wang completed his MASc in Information System Security from Concordia University. Previously, he worked as a customer network support engineer, Ericsson (China) for 12 years. He is currently working as a developer at Above Security Canada.
        Azadeh Tabiban is currently a Ph.D. student at Concordia Institute for Information Systems Engineering (CIISE). She obtained her Master's degree in Information Systems Security from Concordia University, where she contributed to several research projects on cloud security auditing. Her research interest focuses on the development of more accountable and transparent virtualized environments...

        Sommaire:
        Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening. This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security....

        From the reviews: This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems. (D. Grigoras, Computing Reviews, December, 2008)

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com